Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology

Authors

  • Geetha Kurikala  Department of Computer Science and Engineering, Sri Indu College of Engineering & Technology, Telangana, India
  • K Gurnadha Gupta  Department of Computer Science and Engineering, Sri Indu College of Engineering & Technology, Telangana, India
  • A.Swapna  Department of Information and Technology, Sri Indu College of Engineering & Technology, Telangana, India

Keywords:

Cloud Computing, User Behavior Profiling, information Security and truth proof, Fog Computing, Security.

Abstract

Now days, Cloud network is less secure or defend the data on cloud from the data felony attacks, principally corporate executive attacks. An oversized and secure of skilled and private information is kept on Cloud server. Cloud network storage is getting used in numerous industrial sectors. During this sector of the abundant blessings of storing information on cloud, Security still remains a serious downside that must be conquered. Computers system is employed to access the data on Cloud, with the new communication and computing network produce new information security challenges. The subsisting ways of protective secure and vital information on cloud have unsuccessful in preventing information felony attacks. AN altered approach is administrated for securing the data, additionally to the previous normal cryptography mechanisms. The user’s victimization the Cloud square measure monitored and their access patterns square measure recorded. All Users have a novel profile that is monitored and updated to the server. Once AN unwanted activity like unauthorized permission access or random and untargeted hunt for information is detected that isn't seemingly to be of the $64000 user, a misinformation attack is launched. The any user or one who is attempting to access the own information is formed to answer the protection queries. An oversized quantity of Decoy information is provided or out there to the aggressor that successively protects the user’s real information.

References

  1. Yogesh K Nath, Rupesh R Bhairat, Ajit N Ghagare” Implementation of Security and Privacyon Fog Computing using DecoyTechnique” International Engineering Research Journal (IERJ), Volume 2 Issue 9 Page 3446-3448, 2017 ISSN 2395-1621
  2. D. C. Saste, P. V. Madhwai, N. B. Lokhande, V. N.Chothe, “FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology”, IJCTA, Sept-Oct 2014.
  3. Ben-Salem M., and Stolfo, Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE symposium on security and privacy workshop (SPW) 2012.
  4.  “Protect Sensitive Data in Public Cloud from an Theft Attack and detect Abnormal Client Behavior”May2014
  5. CLOUD SECURITY USING FOG COMPUTING Proceedings of IRF International Conference, 30th March-2014
  6. Minimizing Internal Data Theft in Cloud Through Disinformation Attacks P.Jyothi1, R.Anuradha2, Dr.Y.Vijayalata3 International Journal of Advanced Research in Computer and Communication Engineering
  7. SECURED CLOUD COMPUTING WITH DECOY DOCUMENTS 1DNYANESH S. PATIL, 2SUYASH S. PATIL, 3DEEPAK P. POTE, 4NILESH V. KOLI Proceedings of 4th IRF International Conference, Pune, 16th March-2014
  8. Madhusri.K,Navneet. “ Fog Computing: Detecting Malicious Attacks in a cloud international Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013.
  9. Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available:https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
  10. M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,” July 2009. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-of- confidential-twitter-documents/ [11] D. Takahashi, “French hacker who leaked Twitter doc- uments to TechCrunch is busted,” March 2010. [On- line].
  11. P. Allen, “Obama’s Twitter password revealed after french hacker ar- rested for breaking into U.S.president’s   account,”         March  2010.  

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Geetha Kurikala, K Gurnadha Gupta, A.Swapna, " Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.176-181, July-August-2017.